The invention disclosed comprises a method and device for receiving an order request from a first party along with contact information for the first party, routing at least some communication made using, or to, second contact information, such as may be provided to the first party, and providing at least part of the order request and first contact information to a third party. The contact information may be a phone number or an e-mail address or a plurality of same.
|
19. A device for preventing misuse of personal information configured to
receive an order request and a phone number from a first party;
route a telephone call made to a second phone number to said first party;
provide information comprising at least a part of said order request and said second phone number to at least one third party; and
provide an alert when a party other than said at least one third party attempts to communicate using said second contact information.
1. A method for preventing misuse of personal information comprising the steps of:
receiving an order request and a first phone number from a first party;
routing a telephone call made to a second phone number to said first party;
providing information comprising at least a part of said order request and said second phone number to at least one third party
recording a log of phone calls made to said second phone number; and
using said log to detect unauthorized usage of at least a part of said provided information.
28. A device for preventing misuse of personal information configured to: receiving an order request, and contact information, and an optionally
selected request to anonymize at least a part of said contact information from a first party;
provide second contact information for said first party;
forward at least some communication made using said second contact information to said first party;
provide information comprising at least a part of said order request and said second contact information to at least one third party; and
provide an alert when a party other than said at least one third party attempts to communicate using said second contact information.
9. A method for preventing misuse of personal information comprising the steps of:
receiving an order request contact information, and an optionally
selected request to anonymize at least a part of said contact information from a first party;
providing second contact information for said first party;
routing at least some communication made using said second contact information to said first party;
providing information comprising at least a part of said order request and said second contact information to at least one third party;
recording a log of phone calls made to said second phone number;
and using said log to detect unauthorized usage of at least a part of said provided information.
2. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
providing a second e-mail address to at least one third party, and
configuring at least one e-mail sent to said second e-mail address to route to said first party.
13. The method of
15. The method of
16. The method of
17. The method of
18. The method of
20. The device of
23. The device of
24. The device of
25. The device of
26. The device of
27. The device of
32. The device of
35. The device of
36. The device of
37. The device of
|
Identity theft and misuse of personal information are major concerns amongst consumers and often serve as deterrents to commerce because consumers are reluctant to reveal their personal information. It is known that companies often resell phone numbers, e-mail addresses, and street addresses without authorization. Once this information becomes public knowledge, and especially if it is associated with a consumer who has, for example, purchased a certain product in the past or fallen victim to a scam, this information could also be used to target the consumer.
The consumer fear of misuse of data is especially prevalent when commerce is not face to face, such as when a transaction is conducted in whole or in part online or over the telephone. While certain websites and catalogs may have privacy policies, a consumer never knows when his or her information will be sold or misused.
While “do not call” lists are published at least by the U.S. government concerning telemarketing calls made to individuals who have opted out, unfortunately unwanted calls may still be received which are not covered by the policies of the “do not call” lists or the government policy may not suffice. For example, once a consumer conducts a transaction with a business, that business may again call the consumer even if the consumer does not wish to receive such a call. Furthermore, other callers are exempt from the requirements of the “do not call” lists and, for the time being, there is no comparable “do not call” list aimed at preventing the receipt of unwanted e-mail or regular mail.
Still further, even when a call, e-mail, or other communication is from a “legitimate” source, and even with anonymized contact information, there is no deterrent against abuse of the customer's contact information or anonymized contact information. For example, a business or telemarketer may not be the party the consumer believes it to be. In addition, a business or telemarketer may e-mail or call several times, pretending to be a different entity each time, or send spam (unwanted e-mail) to the customer.
One prior art solution is to provide a temporary phone number or e-mail address. However, these too can be utilized in unwanted manners, and, unless there is a large pattern of misuse across many e-mail addresses or phone numbers, it is difficult to track misuse.
In some cases, a consumer may desire that his contact or other information about his needs be sent to a third party. However, in such a case, in the prior art, there is no easy way to track whether the needs of the consumer have been met by the third party and to stop the information from being forwarded.
What is needed in the art is a method for allowing users to be contacted by merchants or others in a commerce setting, whereby the transaction can take place without fear that consumer contact information will be disclosed to an unwanted party. There is further a long-felt and unsolved need to provide an easy method or device to monitor usage of consumer contact information in order to prevent misuse and track desired use.
It is therefore an object of the invention to provide a method and device to allow contact information for a party to be anonymized when provided with an order request.
It is a further object of the invention to provide a simple method of tracking abuse of consumer information.
It is a further object of the invention to spare consumers the receipt of unwanted contact and/or the sale of their contact information and personal information.
It is yet another object of the invention to provide a method and device to track business leads.
The method of the invention generally proceeds by receiving an order request from a first party, such as a consumer, along with a phone number or e-mail address, while providing a second phone number or e-mail address to at least one third party. When the third-party calls or e-mails the second phone number or e-mail address, the e-mail or phone call is routed to the first party's e-mail address or phone number. Thus, at least the second party can track e-mails and calls made by third parties to consumers who submit information to them and detect misuse. Other contact information may also be used in embodiments of the invention.
More specifically, a method of the invention comprises receiving an order request and a phone number from a first party, configuring a second phone number to route at least some incoming calls made to the second phone number to the received phone number, and providing information comprising at least a part of said order request and the second phone number to at least one third party.
The second phone number (or devices associated with the second phone number) may be configured to exclude from routing incoming calls originating from a party other than the at least one third party and the at least one third party may be one third party. The one, or at least one, third party may be designated, chosen, or selected by the first party.
The method may further comprise a step of recording a log of phone calls made to the second phone number. The log may be used to detect unauthorized usage of at least a part of the provided information, such as the phone number or order request provided by the first party. The method may further comprise removing the route (i.e., the call forwarding) upon fulfillment of an order requested by the first party.
The above method may also comprise receiving an e-mail address from the first party and a further step of configuring a second e-mail address to forward at least some incoming e-mails to the first party's e-mail address, and providing the second e-mail address to at least one third party.
Another method of the invention comprises receiving an order request and contact information from a first party, providing second contact information for the first party, configuring at least some communication made using the second contact information to route to the first party, and providing information comprising at least a part of the order request and the second contact information to at least one third party, and removing said route (i.e., e-mail or phone number forwarding) upon fulfillment of the order requested by the first party.
In embodiments of the invention, the communication reaches the first party substantially in real-time. The contact information may be a phone number, e-mail address, or other information used to contact the first party. The first party may know in advance which third party will receive the second contact information, and the routing (or forwarding) may take place only when the proper third party (or third parties) initiates the communication.
The method may further comprise a step of recording a log of communication made using the second contact information and using the log to detect unauthorized usage of at least a part of the provided information.
One or more devices of the invention may be configured to carry out the steps of the method of the invention. A device in embodiments of the invention is configured to receive an order request and a phone number from a first party cause at least some calls made to a second phone number to be routed to the received phone number, and provide or exhibit information comprising at least a part of the order request and second phone number to at least one third party.
The device may route, or cause to be routed, calls directed towards the second phone number to the received phone number only when the calls are received from the at least one third party who was provided with the second number.
The device of the invention may be configured to provide an alert when a call originates from a party other than the at least one third party. The device may remove the route (i.e., forwarding) upon fulfillment of the order requested by the first party.
The receiving may further comprise receiving an e-mail address, and the device may further be configured to forward at least some incoming e-mails directed towards a second e-mail address, to the received e-mail address, and the second e-mail address may be provided to the at least one third party.
In another embodiment of the invention (which may overlap with the previous device), a device is configured to receive an order request and contact information from a first party, provide second contact information for the first party, forward at least some communication made using the second contact information to the first party, and provide information comprising at least a part of the order request and the second contact information to at least one third party.
The contact information may be a phone number or e-mail address. The communication may only be routed when received from the at least one third party. The at least one third party may be one third party, and the third party may be designated by the first party or the second party. An alert may be provided when a communication originates from a party other than the at least one third party, and the route may be removed upon fulfillment of the order requested by the first party.
The invention disclosed comprises a method and device for receiving an order request from a first party, along with contact information for the first party, routing at least some communication made using, or to, second contact information, such as may be provided to the first party, and providing at least part of the order request and first contact information to a third party.
The term “receiving,” in the context of the claim language, means either receiving (i.e., accepting data or information) or causing to be received (i.e., filling out a form and sending data or information to another). Similarly, the term “providing,” in the context of the claim language, means either providing or causing to be provided. Still further, the term “routing,” in the context of the claim language, means either the actual routing of information or data, such as a phone number or e-mail address, from one destination (whether real or virtual) to another, or causing data or information to be routed. Data or information may be caused to be routed if a device or a person carrying out a step of the method of the invention instructs a device to route received communication. Such a person carrying out this step of the method of the invention may be the first party submitting data which causes a device—such as a server—to set up routing of telephone calls or email.
The first party is a consumer, person, or entity seeking to purchase a service or product or conduct business with another person or entity. The order request is a request filled out or sent by the first party to a second party, comprising a request for such a service, product, or offer to conduct business with another person or entity. The request may comprise multiple requests, may be a request for a bid, a bid, and/or a request or offer for a service to be carried out at a specific time or in a specific manner. The contact information is data which may be used by another party to contact the first party either directly or indirectly. The contact information may comprise a telephone number, an e-mail address, a physical address, an instant messenger screen name/user ID, URL, and the like. Still further, a plurality of contact information may be provided, such as home and work telephone numbers, a home telephone number and e-mail address, and the like.
The second party is a party receiving an order request and contact information from the first party. The second party may also generate or cause to be generated second contact information (also referred to as “anonymous contact information”) and forward or cause to be forwarded communications to the first party which were directed at the second contact information. The second party may be a device, a person, or an entity consisting of devices and people, such as one or more companies and computer systems at the company or companies. The third party is a person, device, or entity which desires to carry out at least part of an order requested in an order request.
Embodiments of the invention will become clearer in light of the figures which are described herein below.
In step 140, the first party chooses whether to anonymize his or her phone number, i.e., create or cause to be created a forward or route of at least some calls directed to a second phone number to the first phone number that he or she provided. If the first party chooses to anonymize his or her phone number, then, in step 150, a second phone number is configured or caused to be configured by the first party. The second phone number is configured in step 150 such that at least some phone calls received at the second phone number or via the second contact information will forward to the first phone number or first contact information. If the first party chooses not to anonymize the first phone number, then step 160 is carried out.
Similar to step 140, in step 160, the first party chooses whether to anonymize his or her email address. If the first party chooses to do so, then similar to step 150, step 170 is carried out, whereby a second email address is configured or caused to be configured by the first party. If the first party does not choose to do so, then a second email address will not be configured and the invention proceeds directly to step 180.
In step 180, data are sent to a third party. This is accomplished by the first party sending data to a second party, which, in turn, sends at least some of these data to the third party, or by the first party sending the second contact information directly to a third party. The data will include at least a part of the order request entered in step 110 and at least enough information to contact the first party. Finally, in step 190, the first party receives contact from the third party desiring to fulfill at least a part of the order request via second contact information, such as the configured second phone number or second e-mail address.
It should be understood by one skilled in the art that any contact information may be entered whether existing at the time of filing of this invention or due to exist in the future. It should further be understood that the steps of the invention as shown in
The second party receives an order request from a first party in step 210, a first phone number in step 220, and an e-mail address in step 230. Then, in step 240, if the first party has requested to anonymize his or her phone number, or alternatively, if the second party decides, or is configured, to anonymize the phone number, in step 250 a second phone number is configured to route at least one incoming call to the first party. If the first phone number is not to be anonymized, then the method proceeds directly to step 260, whereby the process is repeated with an e-mail address in steps 260 and 270. In step 280, at least part of the order request and at least some of the second contact information, such as the second phone number or e-mail address, are sent to a third party. Alternative embodiments of the invention described with reference to
In step 330, it is ascertained whether the communication via the second contact information originated from the third party. This may be verified by reviewing e-mail header information, caller ID information, route between the sender and recipient, or other methods known in the art. The third party, in embodiments of the invention, is the party receiving the order request or who was informed of the second contact information by either the first party or second party. If the communication originated from the third party, then in step 340, the communication is routed to the first party, such as to an e-mail address, phone number, or voicemail of the first party. If the communication does not originate from the third party, then in step 350, the communication is not routed to, or is routed away from, the first party, such as by bouncing the e-mail with a temporary or permanent error code, providing a busy signal, or the like.
Steps 370 and 380 are carried out in some embodiments of the invention. In steps 370, the communication request via the second contact information is logged, such as by writing a record of information about the communication to a data file or database for further analysis. Information logged may include time of communication, information about the sender, and contents of the communication. Alternatively, mechanisms for protecting privacy and preventing the logging of the communication itself may be put into place by having the logging conducted by, for example, the second party and the content of the communication routed in such as manner as not to pass through the second party.
Some ways in which the phone call may be routed include routing the call to the phone number provided by the first party (step 442), routing the phone call to voicemail of the first party (step 444), routing the phone call to a voicemail attachment sent to the first party (step 446), or by blocking the phone call (step 448). The voicemail may be compressed or stored by any method known in the art, such as in a WAV or MP3 file. The first or second party may configure routing of some phone calls to one of the routes 442, 444, 446, or 448, and other phone calls to another route. The first party may choose which third parties should receive his contact information, and the choice may be a selection of an individual third party (or individual third party entity) such as a person or a company, or it may be a selection of a specific type of merchant or service provider, for example movers or accountants.
The order routing system 526 routes the data received from the data receiving system 522 (either directly or via anonymizer 524) to a control center 540. The control center 540 may also be, at least in part, the second party, a phone company or phone switch, a server, or the like. The order routing system 526 also routes at least a part of an order request received from first party 510 and contact information which may have been anonymized by anonymizer 524 to at least one third party 530.
Describing the control center 540 in more detail, the control center comprises a user management system 542. In embodiments of the invention, the user management system is configured to allow a user to control routing preferences, enabling and disabling of second contact information, hearing voicemail, and so forth. The user management system 542 may allow a first party 510 to directly or indirectly configure the phone routing system 544 and e-mail routing system 546. The phone routing system 544 and e-mail routing system 546 may each be separate devices from the user management system 542 and from each other. The e-mail routing system 546 may be a mail server, and the phone routing system 544 may be a telephone switch. When a third party 530 sends an e-mail or telephone call, the respective routing system is accessed to determine how the call or e-mail should be routed, as described with regard to the method of the invention. If the call or e-mail is to be sent to the first party 510 via the provided or known contact information, then it is routed as such. It should also be understood by one skilled in the art that, when another method of contact is used, a further routing system may be necessary. For instance, when routing instant messages via second contact information, an IM routing or forwarding system may be used.
The control center 540 may also communicate (exchange data with) an interface 550 comprising a logging system 552 and/or alert system 554. The logging system 552 logs information about calls, e-mails, or other communications. The alert system 554 may be used to signal a first party 510, second party 520, or other party that there has been an unauthorized communication or attempt, and a party may decide to take further action to limit or discourage such unauthorized communication or attempt. Methods of limiting/discouraging include contacting the offending party, exiting a contract with the offending party, seeking litigation, notifying a government authority such as a federal trade commission (for violations of trade, including the “do not call” list) and so forth.
Order request 740, in the embodiment depicted in
Anonymization check box 750 provides the first party with an indication of whether or not to anonymize his or her e-mail address and phone number. As described above, in other embodiments of the invention, the decision may be made by a second party, may be predefined by a second party, or may allow for a selection by the first party to anonymize only an e-mail address or phone number. Finally, submit button 760 allows a user to send his or her order request and contact information to a second party.
While the invention has been taught with specific reference to the above embodiments, a person having ordinary skill in the art will recognize that changes can be made in form and detail without departing from the spirit and the scope of the invention. The described embodiments are to be considered in all respects only as illustrative and not restrictive. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Zehnbacht, Alexander, Finkelstein, Steve S.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
5361295, | Dec 12 1989 | IMAGINEX FUND I, LLC | Anonymous interactive telephone system |
5818836, | Aug 09 1995 | CLICK-TO-CALL TECHNOLOGIES LP | Method and apparatus for anonymous voice communication using an online data service |
5907602, | Mar 30 1995 | Azure Solutions Limited | Detecting possible fraudulent communication usage |
5907677, | Aug 23 1996 | THRYV, INC | Method for establishing anonymous communication links |
6157829, | Oct 08 1997 | MOTOROLA SOLUTIONS, INC | Method of providing temporary access of a calling unit to an anonymous unit |
6327353, | Jun 04 1998 | Fujitsu Limited | Apparatus and method for permitting temporary use of a telephone number |
6665389, | Dec 09 1999 | ACCESSIFY, LLC | Anonymous interactive internet-based dating service |
6694003, | Oct 21 1999 | AT&T Corp | Method and apparatus for prepaid inbound call forwarding service |
6717938, | Apr 15 1999 | J2 CLOUD SERVICES, LLC | System controlling use of a communication channel |
7020256, | Feb 07 2002 | Intellectual Ventures II LLC | Dynamic telephone numbering system |
7099304, | Sep 05 2000 | Flexiworld Technologies, Inc. | Apparatus, methods and systems for anonymous communication |
20040190707, | |||
20080037729, | |||
20090265312, | |||
20100128857, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Feb 11 2008 | Mask.It, LLC | (assignment on the face of the patent) | / | |||
Mar 25 2008 | ZEHNBACHT, ALEXANDER, MR | LIMELOCK LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 020771 | /0303 | |
Mar 25 2008 | FINKELSTEIN, STEVE S, MR | LIMELOCK LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 020771 | /0303 | |
Jan 24 2011 | LIMELOCK LLC | MASK IT, LLC | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 027440 | /0204 | |
Oct 18 2018 | MASK IT, LLC | DASS GROUP LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 047232 | /0265 |
Date | Maintenance Fee Events |
Aug 05 2015 | M2551: Payment of Maintenance Fee, 4th Yr, Small Entity. |
Aug 07 2019 | M2552: Payment of Maintenance Fee, 8th Yr, Small Entity. |
Sep 25 2023 | REM: Maintenance Fee Reminder Mailed. |
Mar 11 2024 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Feb 07 2015 | 4 years fee payment window open |
Aug 07 2015 | 6 months grace period start (w surcharge) |
Feb 07 2016 | patent expiry (for year 4) |
Feb 07 2018 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 07 2019 | 8 years fee payment window open |
Aug 07 2019 | 6 months grace period start (w surcharge) |
Feb 07 2020 | patent expiry (for year 8) |
Feb 07 2022 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 07 2023 | 12 years fee payment window open |
Aug 07 2023 | 6 months grace period start (w surcharge) |
Feb 07 2024 | patent expiry (for year 12) |
Feb 07 2026 | 2 years to revive unintentionally abandoned end. (for year 12) |